First published: Thu Oct 26 2023(Updated: )
Secret token configuration is never applied when using ECK <2.8 with APM Server >=8.0. This could lead to anonymous requests to an APM Server being accepted and the data ingested into this APM deployment.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Elastic Elastic Cloud On Kubernetes | <2.8 | |
Elastic Apm Server | >=8.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-31416.
The title of the vulnerability is Elastic Cloud on Kubernetes (ECK) secret token configuration issue.
The secret token configuration is never applied when using ECK <2.8 with APM Server >=8.0, which could lead to anonymous requests being accepted and data ingested into the APM deployment.
The affected software includes Elastic Cloud on Kubernetes (ECK) version up to exclusive 2.8 and APM Server version from inclusive 8.0.
The severity of the vulnerability is medium with a CVSS score of 5.3.
To fix the vulnerability, update ECK to version 2.8 or higher, and update APM Server to a version lower than 8.0.